• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Shape modeling and matching in identifying protein structure from
Shape modeling and matching in identifying protein structure from

... the lengths of helices as well as their connectivity. In particular, the graph representing the density volume is obtained by computing a skeleton that encodes the topology of the high-density regions (Figure 1 (d)). Using the shape representations, helix correspondence reduces to a constrained erro ...
RWA Problem formulations
RWA Problem formulations

Distributed Spectrum Management and Relay
Distributed Spectrum Management and Relay

... Proposed Solution Algorithm – Monotonicity Decompose original problem into two subproblems Design distributed algorithm for each subproblem Perform two algorithms iteratively Monotonicity condition is easily satisfied by each subproblem ...
The Wolf Colony Algorithm and Its Application
The Wolf Colony Algorithm and Its Application

Link State Routing Algorithm
Link State Routing Algorithm

Thomas  L. Magnanti and Georgia  Perakis
Thomas L. Magnanti and Georgia Perakis

... Motivated by the celebrity of these geometric algorithms for solving linear programming problems, in this paper we examine the question of whether similar geometric algorithms will efficiently solve variational inequality problems. The general geometric framework, which we describe in detail in Sect ...
A Dynamic Programming Approach to De Novo Peptide Sequencing
A Dynamic Programming Approach to De Novo Peptide Sequencing

... n COOH). These two ions are complementary because joining them determines the original peptide sequence. This dissociation process fragments a large number of molecules of the same peptide sequence, and ideally, the resulting ions contain all possible pre x subsequences and suÆx subsequences. Table ...
Lesson 12: Estimating Digits in a Quotient
Lesson 12: Estimating Digits in a Quotient

... Opening Exercise (5 minutes)  ...
Routing Table Lookup
Routing Table Lookup

Reinforcement Learning for Neural Networks using Swarm Intelligence
Reinforcement Learning for Neural Networks using Swarm Intelligence

... candidate solution for a given problem. Second, when an ant follows a path, the amount of pheromone deposit on that path is proportional to the quality of the corresponding candidate solution for the target problem. Third, when an ant has to choose between two or more paths, the path(s) with a large ...
Detecting Wormhole Attacks in Wireless Sensor Networks
Detecting Wormhole Attacks in Wireless Sensor Networks

... antenna and knows its physical location. Other nodes in the network use the anchor nodes to locate themselves. Since a wormhole produces shortcuts in a network, the directional antennas deployed in the anchor nodes help detect the attack; nodes can then defend against the attack by discarding incorr ...
NOVEL TRANSFORMATION TECHNIQUES USING Q-HEAPS WITH APPLICATIONS TO COMPUTATIONAL GEOMETRY
NOVEL TRANSFORMATION TECHNIQUES USING Q-HEAPS WITH APPLICATIONS TO COMPUTATIONAL GEOMETRY

... versions of the original query. Finally, a non-empty output at a node no longer ensures that we can afford to search each of its children, since none of them may contain an output object. Doing so would result in an O(f log² n) term in the overall search complexity, where f is the output size. In th ...
Grade 6 Mathematics Module 2, Topic C, Lesson 12
Grade 6 Mathematics Module 2, Topic C, Lesson 12

... Closing (5 minutes) ...
HUANG LAYOUT - Systems and Computer Engineering
HUANG LAYOUT - Systems and Computer Engineering

An Efficient Algorithm for Finding Similar Short Substrings from
An Efficient Algorithm for Finding Similar Short Substrings from

Extended Hidden Number Problem and Its
Extended Hidden Number Problem and Its

Radiation Pattern Reconstruction from the Near
Radiation Pattern Reconstruction from the Near

Global Consistency for Continuous Constraints
Global Consistency for Continuous Constraints

... provide relatively poor results when applied to continuous CSPs: they ensure neither completeness nor convergence in the general case (a good insight into the problems encountered can be found in [1]). However, Faltings [5] has shown that some undesirable features of propagation algorithms with inte ...
pptx - Electrical and Computer Engineering
pptx - Electrical and Computer Engineering

... finding solutions to the other problems? To answer this, we must define a reduction of a problem – A reduction is a transformation of one problem A into another problem B such that the solution to B yields a solution to A – A reduction that may be preformed in polynomial time is said to be a ...
Rotamer Packing Problem - NUS School of Computing
Rotamer Packing Problem - NUS School of Computing

... • In a case study using insulin structure of 76 residues, the initial number of rotamer configurations is 2.7E+76 • After 9 iterations, only 7200 are left. ...
Optimization Techniques Incorporating Evolutionary Model in
Optimization Techniques Incorporating Evolutionary Model in

Novel reinforcement learning-based approaches to reduce loss
Novel reinforcement learning-based approaches to reduce loss

Blame Trees - Edward Z. Yang
Blame Trees - Edward Z. Yang

... modifications to old versions of document, a confluently persistent structure additionally supports a merge operation. Any two documents can be merged, which means that the version dependencies can form a directed acyclic graph (DAG). Our paper presents an implementation of this data structure which ...
paper
paper

Ch04 - Skylight Publishing
Ch04 - Skylight Publishing

... proportional to log2 n ...
< 1 2 3 4 5 6 7 8 ... 27 >

Dijkstra's algorithm

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report